Cyber Warfare and Cyber Terrorism

Cyber Warfare and Cyber Terrorism

Indexed In: PsycINFO®, SCOPUS View 1 More Indices
Release Date: May, 2007|Copyright: © 2007 |Pages: 564
DOI: 10.4018/978-1-59140-991-5
ISBN13: 9781591409915|ISBN10: 1591409918|EISBN13: 9781591409922
Hardcover:
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
Hardcover:
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
E-Book:
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Immediate access after purchase
  • No DRM
  • PDF download
  • Receive a 10% Discount on eBooks
Hardcover +
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • PDF download
Hardcover +
E-Book:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Immediate access after purchase
  • No DRM
  • PDF download
Article Processing Charge:
Available
$700.00
TOTAL SAVINGS: $700.00
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Effective immediately, IGI Global has discontinued softcover book production. The softcover option is no longer available for direct purchase.
Description & Coverage
Description:

Enormous efficiencies have been gained over the past twenty-five years as a result of the introduction of computers and telecommunications technologies. The use of these systems and networks translates into a major concentration and centralization of information resources, however, this consolidation creates a major vulnerability to a host of attacks and exploitations. Cyber Warfare and Cyber Terrorism reviews related problems, issues, and presentations of the newest research in this field.

Cyber Warfare and Cyber Terrorism provides an overview with basic definitions of cyber terrorism and information warfare, along with recommendations on how to handle these attacks. It presents detailed discussion on primary target facilities, deliverables, external penetration, starting points for preparations against attacks, and planning security systems. The book gives a solid introduction to cyber warfare and cyber terrorism in the 21st Century. It is a must-have for information technology specialists and information security specialists who want a first hand briefing on developments related to cyber warfare and cyber terrorism attacks.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Access Control Models
  • Anti-spam approaches
  • Behavioral information security
  • Bio-cyber machine gun
  • Bouncing techniques
  • Cryptography
  • Cyber Forensics
  • Cyber Security Models
  • Cyber Stalking
  • Cyber terrorism attacks
  • Cyber war defense
  • Data Mining
  • Databases
  • Deception in cyber attacks
  • Denial-of-service (dos) attacks
  • Economics of cyber security
  • Electronic money management
  • Electronic surveillance and civil rights
  • Information warfare trends
  • Infrastructures of cyber warfare
  • Knowledge Management
  • Malware
  • Personnel anomaly detection
  • Social Engineering
  • Spam, spim and illegal advertisement
  • SQL code poisoning
  • Steganography
  • Terrorism and the internet
Reviews & Statements

This timely reference book, based on an extensive compilation, is not a guide, but rather an introductory review of cyber warfare and cyber terrorism in the 21st century. The experienced editors have written an easily comprehended book that is international in scope, and covers the last 25 years in computer and telecommunications developments and the Web. Highly recommended. All academic libraries and professional collections; all levels.

– CHOICE, Vol. 45, No. 06 (2008)
Table of Contents
Search this Book:
Reset
Editor/Author Biographies
Lech Janczewski has over thirty five years experience in information technology. He is an Associate Professor at the University of Auckland, Department of Information Science and Operations Management. His area of research includes management of IS resources with the special emphasis on data security. Dr. Janczewski has written more than 100 publications that have been presented in scientific journals, conference proceedings and books. He is the chairperson of the New Zealand Information Security Forum, a Fellow of the New Zealand Computer Society, and the secretary of the IFIP’s Technical Committee on Security and Protection in Information Processing Systems (TC-11).
Andrew Colarik has accumulated over twenty five years experience of knowledge utilizing computer information systems. This includes systems analysis and design, network administration, university level teaching, and the justification, specification, and implementation of factory and office automation. He is the holder of a Ph. D. in Information Systems from the University of Auckland, and a Masters of Business Administration from Kent State University. As a researcher, author, and inventor, Dr. Colarik has been published in top-tier security conferences, authored several information security books, and is an inventor of both utility and design patents.
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.